Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe
-
Size
94KB
-
MD5
73627bdd794c7c4f424578dde952130d
-
SHA1
476367c7270060b1cacc949df5dc044546f9b283
-
SHA256
2a8bf18f155c5fc78817746b56419d70ff60d3ceb9268dee2cc5f9e2ab7b9533
-
SHA512
1c16eea4623819db0312dcde278bab9b6cb28da8399bb0440adb50523853086e30345f14d463140866796e1087c5ac07b12cba67cc334aae7e3b1d2534f12eb8
-
SSDEEP
1536:hpIBLQ48UElI7DA/5cKpwCV56udBTjmkwu6TsnesCZ6bt8JGeET83YWSrsCKra94:uU3UElI70/5cNCP64jLFResa6b+JGeEm
Malware Config
Extracted
pony
http://41.222.33.141:8080/pony/gate.php
http://85.214.243.87:8080/pony/gate.php
http://88.85.99.44:8080/pony/gate.php
-
payload_url
http://www.stablerkraemer.at/15Psv3zJ/4ah6NuS.exe
http://www.grupozear.es/5PYpsVTJ/mPt0Zx.exe
http://www.angauto.com/X1Peab6k/RdF.exe
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
73627bdd794c7c4f424578dde952130d_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
73627bdd794c7c4f424578dde952130d_JaffaCakes118.exedescription pid process Token: SeImpersonatePrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeTcbPrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeCreateTokenPrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeBackupPrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeRestorePrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 4652 73627bdd794c7c4f424578dde952130d_JaffaCakes118.exe